The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/10184 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/184558 | Third Party Advisory US Government Resource |
http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15927 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-07-26 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-0711
Mitre link : CVE-2004-0711
JSON object : View
CWE
Products Affected
bea
- weblogic_server